Search

Your search keyword '"Access Control"' showing total 1,173 results

Search Constraints

Start Over You searched for: Descriptor "Access Control" Remove constraint Descriptor: "Access Control" Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources
1,173 results on '"Access Control"'

Search Results

1. On key assignment schemes and cryptographic enforcement mechanisms for information flow policies

2. Completeness in languages for attribute-based access control

3. Cloud Security: Challenges and Solutions

4. A GENERALIZED NET MODEL FOR ACCESSING INFORMATION RESOURCES IN A SECURE ENVIRONMENT

5. A Robust and Secure Data Access Scheme for Satellite-Assisted Internet of Things With Content Adaptive Addressing

6. An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption

8. Managing Network Security in Cloud Computing: Analyzing Vulnerabilities and Implementing Effective Defense Strategies

9. A Blockchain Based Scalable Domain Access Control Framework for Industrial Internet of Things

10. Permission-Based Dynamic Access Control Models for Enhanced Data Security : Integrating Contextual Awareness and Role Flexibility for Secure Healthcare Data Management

11. Implementering av Zero Trust i ett händelsestyrt meddelandesystem

12. Mapping out the Key Security Components in Relational Databases (MK-SCoRe) : Enhancing the Security of Relational Database Technology

13. Privacy-Preserving Techniques in IoT: Investigating methods to protect user privacy while utilizing data in IoT systems

14. XACML2mCRL2: Automatic transformation of XACML policies into mCRL2 specifications

15. Achieving secure and efficient access control of personal health records in a storage cloud

16. On the use of attribute-based encryption in publicly verifiable outsourced computation

17. A trust-based adaptive access control model for wireless sensor networks

18. Towards a worldwide storage infrastructure

19. Demonstrate and document : the development of a best practice model for biometric access control management

20. Automated Management of Attribute-Based Policies for Access Control using Tag-Matching

21. On Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms

22. Implementation of a simplified Access Control language using JSON

23. Adding security to existing IoMT protocols. Analysis and integration

24. Increasing Efficiency and Scalability in AWS IAM by Leveraging an Entity-centric Attribute- & Role-based Access Control (EARBAC) Model

25. Towards Certified Distributed Query Processing

26. Linking Contexts from Distinct Data Sources in Zero Trust Federation

27. Role Mining With Hierarchical Clustering and Binary Similarity Measures

28. Smart Contract-Based Access Control for the Internet of Things

29. The Bitcoin Network as Platform for Trans-Organizational Attribute Authentication

30. Role of Building Automation Technology in Creating a Smart and Sustainable Built Environment

31. Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things

32. Access Management in Organizations : A Comprehensive Study and Scenario-based Analysis

33. Attribute-Based Approaches for Secure Data Sharing in Industrial Contexts

34. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

35. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

36. Automatic Hybrid Access Control in SCADA-Enabled IIoT Networks Using Machine Learning

37. Edge-enabled Zero Trust Architecture for ICPS with Spatial and Temporal Granularity

38. Profile Based Access Control Model Using JSON Web Tokens

39. Tenant Separation on a multi-tenant microservice platform

40. Authentication-enabled attribute-based access control for smart homes

41. Authentication-enabled attribute-based access control for smart homes

42. Ownership based access control through non fungible tokens

43. Internet censorship in the European Union

44. WebDSL: Linguistic Abstractions for Web Programming

45. Dynamic Access Control for Industrial Systems

46. Beyond 'Protected' and 'Private': An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts

47. Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control

48. An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud

49. The Synchronization Power (Consensus Number) of Access-Control Objects: the Case of AllowList and DenyList

50. Access Control Enforcement Architectures for Dynamic Manufacturing Systems

Catalog

Books, media, physical & digital resources